<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD and policy based routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4685527#M1093329</link>
    <description>&lt;P&gt;here's my nat statements:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;nat (Inside,Outside) after-auto source dynamic Any_Any interface destination static Any_Any Any_Any&lt;BR /&gt;nat (Inside,Micronova) after-auto source dynamic Any_Any interface destination static Any_Any Any_Any&lt;/P&gt;</description>
    <pubDate>Mon, 12 Sep 2022 14:42:49 GMT</pubDate>
    <dc:creator>dbogdan</dc:creator>
    <dc:date>2022-09-12T14:42:49Z</dc:date>
    <item>
      <title>FTD and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4683249#M1093246</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We have a FTD running version 7.0.2 and use PBR based on source networks and route the traffic to different gateways.&lt;/P&gt;
&lt;P&gt;It work great for outbound traffic, but we also publish a server on the internet and for some reason PBR don't work and we cannot reach the server. Instead the return traffic is using the default gateway and not the one specified in the route map.&lt;/P&gt;
&lt;P&gt;Both the inside and the outside interface are included in the PBR and the ACL that we use for the outside interface, have source any and the the server address on the inside as destination. I also tried to put the translated address as destination, but that didn't help either.&lt;/P&gt;
&lt;P&gt;Here's some of the output&amp;nbsp; from the packet-tracer, where we can se it uses the wrong interface and therefore get dropped.&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: SUBOPTIMAL-LOOKUP&lt;BR /&gt;Subtype: suboptimal next-hop&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Input route lookup returned ifc Outside is not same as existing ifc Outside2&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: Inside_2(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-adjacency) No valid adjacency, Drop-location: frame 0x000055ce0b4fd15c flow (NA)/NA&lt;/P&gt;
&lt;P&gt;Any ideas on what could be wrong?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;/Chess&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Sep 2022 07:54:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4683249#M1093246</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2022-09-08T07:54:50Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4683539#M1093253</link>
      <description>&lt;P&gt;share the NAT you use in FTD&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Sep 2022 11:15:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4683539#M1093253</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-09-08T11:15:19Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4683595#M1093255</link>
      <description>&lt;P&gt;As &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt; is implying, your NAT rule is the most likely culprit. If the server's static NAT is on the outside interface (vs. Outside2), then it won't work.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Sep 2022 12:18:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4683595#M1093255</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-09-08T12:18:58Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4685524#M1093328</link>
      <description>&lt;P&gt;I have the same issue.&amp;nbsp; I am using dynamic NAT to two different ISPs.&amp;nbsp; The Nat statements are in the order of the Outside, then Ourside2.&amp;nbsp; It never thakes that path even by deleting the route to the outside interface gateway&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2022 14:40:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4685524#M1093328</guid>
      <dc:creator>dbogdan</dc:creator>
      <dc:date>2022-09-12T14:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4685527#M1093329</link>
      <description>&lt;P&gt;here's my nat statements:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;nat (Inside,Outside) after-auto source dynamic Any_Any interface destination static Any_Any Any_Any&lt;BR /&gt;nat (Inside,Micronova) after-auto source dynamic Any_Any interface destination static Any_Any Any_Any&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2022 14:42:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4685527#M1093329</guid>
      <dc:creator>dbogdan</dc:creator>
      <dc:date>2022-09-12T14:42:49Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4685529#M1093331</link>
      <description>&lt;P&gt;Also adding that this setup works perfectly on an ASA configured like an ASA, not as an FTD.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2022 14:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4685529#M1093331</guid>
      <dc:creator>dbogdan</dc:creator>
      <dc:date>2022-09-12T14:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4685608#M1093333</link>
      <description>&lt;P&gt;The solution is a follows:&lt;/P&gt;&lt;P&gt;1. do not add both interfaces in the same zone.&amp;nbsp; create an Outside zone and an Outside 2 zone.&lt;/P&gt;&lt;P&gt;2. set up autonat twice.&amp;nbsp; One for using two different object names that are 0.0.0.0/0 (any)&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;object network Any_Any&lt;BR /&gt;nat (Inside,Outside) dynamic interface&lt;BR /&gt;object network any4&lt;BR /&gt;nat (Inside,Outside2) dynamic interface&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2022 18:04:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4685608#M1093333</guid>
      <dc:creator>dbogdan</dc:creator>
      <dc:date>2022-09-12T18:04:02Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4686017#M1093343</link>
      <description>&lt;P&gt;&lt;A href="https://ciscocentral.blogspot.com/p/cisco-certifications.html" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Cisco Firepower Threat Defense (FTD)&lt;/STRONG&gt;&lt;/A&gt; is a unified software image, which includes the Cisco ASA features and FirePOWER Services. This unified software is capable of offering the function of ASA and FirePOWER in one platform, both in terms of hardware and software features.&lt;/P&gt;&lt;P&gt;&lt;A href="https://ciscocentral.blogspot.com/p/cisco-certifications.html" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;The Policy-Based Routing&lt;/STRONG&gt;&lt;/A&gt; feature is a process whereby a device puts packets through a route map before routing the packets. The route map determines which packets are routed next to which device. Policy-based routing is a more flexible mechanism for routing packets than destination routing.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 08:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-policy-based-routing/m-p/4686017#M1093343</guid>
      <dc:creator>alirafaleiro</dc:creator>
      <dc:date>2022-09-29T08:30:30Z</dc:date>
    </item>
  </channel>
</rss>

